Black Basta Ransomware May Have Exploited MS Windows Zero-Day Flaw

Share:

Threat actors linked to the Black Basta ransomware may have exploited a recently disclosed privilege escalation flaw in the Microsoft Windows Error Reporting Service as a zero-day, according to new findings from Symantec.

The security flaw in question is CVE-2024-26169 (CVSS score: 7.8), an elevation of privilege bug in the Windows Error Reporting Service that could be exploited to achieve SYSTEM privileges. It was patched by Microsoft in March 2024.

“Analysis of an exploit tool deployed in recent attacks revealed evidence that it could have been compiled prior to patching, meaning at least one group may have been exploiting the vulnerability as a zero-day,” the Symantec Threat Hunter Team, part of Broadcom, said in a report shared with The Hacker News.

The financially motivated threat cluster is being tracked by the company under the name Cardinal. It’s also monitored by the cybersecurity community under the names Storm-1811 and UNC4393.

It’s known to monetize access by deploying the Black Basta ransomware, usually by leveraging initial access obtained by other attackers – initially QakBot and then DarkGate – to breach target environments.

In recent months, the threat actor has been observed using legitimate Microsoft products like Quick Assist and Microsoft Teams as attack vectors to infect users.

“The threat actor uses Teams to send messages and initiate calls in an attempt to impersonate IT or help desk personnel,” Microsoft said. “This activity leads to Quick Assist misuse, followed by credential theft using EvilProxy, execution of batch scripts, and use of SystemBC for persistence and command-and-control.”

Symantec said it observed the exploit tool being used as part of an attempted but unsuccessful ransomware attack.

The malicious program “takes advantage of the fact that the Windows file werkernel.sys uses a null security descriptor when creating registry keys,” it explained.

“The exploit takes advantage of this to create a ‘HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WerFault.exe’ registry key where it sets the ‘Debugger’ value as its own executable pathname. This allows the exploit to start a shell with administrative privileges.”

Metadata analysis of the artifact shows that it was compiled on February 27, 2024, several weeks before the vulnerability was addressed by Microsoft, while another sample unearthed on VirusTotal had a compilation timestamp of December 18, 2023.

While threat actors are prone to altering the timestamps of files and directories on a compromised system to conceal their actions or impede investigations – a technique referred to as timestomping – Symantec pointed out that there are likely very few reasons for doing so in this case.

When reached for comment, a Microsoft spokesperson told The Hacker News that “This issue was addressed in March, and customers who apply the fix are protected. Our security software also includes detections to protect against the malware.”

The development comes amid the emergence of a new ransomware family called DORRA that’s a variant of the Makop malware family, as ransomware attacks continue to have a revival of sorts after a dip in 2022.

According to Google-owned Mandiant, the ransomware epidemic witnessed a 75% increase in posts on data leak sites, with more than $1.1 billion paid to attackers in 2023, up from $567 million in 2022 and $983 million in 2021.

“This illustrates that the slight dip in extortion activity observed in 2022 was an anomaly, potentially due to factors such as the invasion of Ukraine and the leaked Conti chats,” the company said.

“The current resurgence in extortion activity is likely driven by various factors, including the resettling of the cyber criminal ecosystem following a tumultuous year in 2022, new entrants, and new partnerships and ransomware service offerings by actors previously associated with prolific groups that had been disrupted.”.

Ravie Lakshmanan

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
2:46 pm, Jun 25, 2025
weather icon 26°C
L: 25° | H: 27°
light rain
Humidity: 55 %
Pressure: 1011 mb
Wind: 6 mph SSW
Wind Gust: 0 mph
UV Index: 0
Precipitation: 0.39 mm
Clouds: 20%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 4:44 am
Sunset: 9:21 pm
DailyHourly
Daily ForecastHourly Forecast
Today 10:00 pm
weather icon
25° | 27°°C 0 mm 0% 6 mph 57 % 1011 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
18° | 23°°C 1 mm 100% 15 mph 83 % 1018 mb 0 mm/h
Fri Jun 27 10:00 pm
weather icon
16° | 28°°C 0 mm 0% 13 mph 64 % 1023 mb 0 mm/h
Sat Jun 28 10:00 pm
weather icon
17° | 31°°C 0 mm 0% 11 mph 79 % 1024 mb 0 mm/h
Sun Jun 29 10:00 pm
weather icon
20° | 33°°C 0 mm 0% 11 mph 77 % 1024 mb 0 mm/h
Today 4:00 pm
weather icon
26° | 26°°C 0 mm 0% 6 mph 55 % 1011 mb 0 mm/h
Today 7:00 pm
weather icon
25° | 26°°C 0 mm 0% 5 mph 52 % 1010 mb 0 mm/h
Today 10:00 pm
weather icon
22° | 23°°C 0 mm 0% 4 mph 57 % 1010 mb 0 mm/h
Tomorrow 1:00 am
weather icon
20° | 20°°C 0.2 mm 20% 6 mph 77 % 1010 mb 0 mm/h
Tomorrow 4:00 am
weather icon
18° | 18°°C 0 mm 0% 7 mph 83 % 1009 mb 0 mm/h
Tomorrow 7:00 am
weather icon
18° | 18°°C 0 mm 0% 8 mph 73 % 1010 mb 0 mm/h
Tomorrow 10:00 am
weather icon
23° | 23°°C 0 mm 0% 12 mph 54 % 1011 mb 0 mm/h
Tomorrow 1:00 pm
weather icon
21° | 21°°C 0 mm 0% 12 mph 63 % 1012 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€92,852.05
2.41%
Ethereum(ETH)
€2,100.39
0.64%
Tether(USDT)
€0.86
0.01%
XRP(XRP)
€1.90
1.12%
Solana(SOL)
€126.95
1.89%
USDC(USDC)
€0.86
0.01%
Dogecoin(DOGE)
€0.143293
1.97%
Shiba Inu(SHIB)
€0.000010
0.75%
Pepe(PEPE)
€0.000009
1.92%
Scroll to Top